ELF>@@q@8 @@@@00 %%PPPk{{k{{888 XXXDDStd888 Ptd\a\a\a\\QtdRtdk{{pp/lib64/ld-linux-x86-64.so.2GNUGNUo&+$H- }TGNUG@GIڡ]emIr2w C.RU$z%) W,mfb  ^l<I8 p`t"libcap.so.2_ITM_deregisterTMCloneTable__gmon_start___ITM_registerTMCloneTablecap_from_namecap_to_namecap_setuidcap_get_secbitscap_get_ambientcap_reset_ambientcap_drop_boundcap_set_proccap_max_bitscap_set_modecap_mode_namecap_freecap_get_boundcap_clear_flagcap_get_proccap_setgroupscap_from_textcap_set_flagcap_to_textcap_get_modecap_set_ambientcap_dupcap_get_flagcap_set_secbitslibc.so.6chroot__printf_chkexitstrncmpperrorgetpwuidgetgrgidputsfork__stack_chk_failputcharkillstrdupstrtokgetgrnam_rgetpwnamcallocprctl__errno_locationchdir__fprintf_chkmemcpystrtoulmallocgetgid__ctype_b_locstderrgetgroupsgetuidexecvestrtoullfwritegeteuidwaitpidsleep__cxa_finalize__sprintf_chkgetgrouplistsetgidstrcmpstrerror__libc_start_mainsysconfGLIBC_2.3GLIBC_2.3.4GLIBC_2.14GLIBC_2.4GLIBC_2.2.5ii "ti ,8ii Cui M{@{@IG!<HE}}}}}}}} } ~ ~ ~ ~ ~(~0~8~@~H~P~X~`~h~p~x~~~~~~ ~"~#~$~%~&~'~(~)~*~+~,-./0 1(20384@5H6P7X8`9h:p;x=>?@ABCDFHH_HtH5]%]hhhhhhhhqhah Qh Ah 1h !h hhhhhhhhhhqhahQhAh1h!hhhh h!h"h#h$h%h&h'qh(ah)Qh*Ah+1h,!h-h.h/h0h1h2h3h4h5h6h7qh8ah9Qh:Ah;1h<!h=h>h?h@%}[D%u[D%[D%=YD%5YD%-YD%%YD%YD%YD% YD%YD%XD%XD%XD%XD%XD%XD%XD%XD%XD%XD%XD%XD%XD%XD%XD%XD%}XD%uXD%mXD%eXD%]XD%UXD%MXD%EXD%=XD%5XD%-XD%%XD%XD%XD% XD%XD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%WD%}WD%uWD%mWD%eWD%]WD%UWD%MWD%EWD%=WDAWAVAUATUSH|$Ht$HT$dH%(H$1Ex}8cHt0H5,P1 HD$vHT$D$HZL|@L#H5'L H5'L)H5'Lc H5'L% H5'LH5q'LH5x'L2H5'LeH5'LLH=' LH='w"LH='[ LH=s'? LH=c'# LH=R'R LH=b' LH=' LH=' LH=' LH='{. LH='_X LH='C LH='' LH='pLH=P(YLH=<(BLH==(<LH=A(@LH=G( LH=4(r LH=8(VAI|$ 11H9AH (HESH81@IHt$PH|$HH5}#L1tC @H|$PH|$HArEyHl$HH|$PH HI91HHt$PI|$ =|$P~H H)H H?RH81fD1ayHRH=#HLIH] HLl$DNfLLEZH|$Pi|$DrH|$H621H5!IHuHl$HH|$PHL@I|$ @I|$ 1oHPH=)"HHHH,HSIHt$1AHH 1?1HHIMH3I1LHt$ LvLLHLHHHHHH|HL$(Ht$ HH ~tLH={!2HT$(LHH6HNIHoL:HBMtLLLPLKHHZ1AHH 0qHHxIHyH[HLKfLzIL- @LL%2LHIuʿLH5#1jLE1UHHdH!IH1AHH / LiLHHx HEH= QHAvEaH H&H HRHHxFIHH HImW8LH5fH1w=I LHILLH5%MMH HH1=H5L-L%DL1LHHuο L1I|$1)Hʼn1;8HS$IHiLH81BH="H=C"vH H H"RHs"HHHKH81HW|$I|$ 11DHŅ|D$1TI|$ 11HlAH$LH DD$DLHH6KH81H=FY11I|$ |$HJ|$X!Dt$Ht$P1DAA9DD$PD9D$H=H=p!9H=!#H=! H=!I|$11H{8+HII|$ 11lHr>8HuIEH HC!`I|$11 HA88DHLIHt$PI|$ |$PH DD$PH(#H ILcHHD$PdLl$ppHL$PLLHct$P}L}_+r8MMIHHHg"H81uKH= 5EHHD$ iIH4HHD$0AHHHE1Hx HD$HHD$86LD$8HL$ LLHt$PHD$HH<@BDI1H5Dl$(IHtWL9l$0~&IHDPt11LBDHGDH H81S)LHc|$(H$uFHH4GH=BHH HHFH=!HAH{L$HkH=iHFH=HY?HpFH=H/I|$ 1E1AH5L52HI1H[AA@DLDHH2tDHT$ 'HT$ HHt>HH51H,LH H LHNDH51vLfH=(H=H=sH-EH=EHH=eFI|$ 11nHF9@AHiyHt$PI|$>W|$P H HHDHt$HI|$6t$HHL$PHH==|$P2HHD$H5H1HH3H=@1@A<$-H=tHD$H8HT$HHHcD$HHT$H;HCH=HsYT1HHH5 HI1^LHH5'CH=;H5 CH=(CL eC¸@HHHtH΍xHHH0A49uI1L5HLH5L%L-|HHHD@1@LHVIE@H5?ID1v@LH)IE@H5ID1I@ LHIE@IDH511ex-@ŀLHIE@@H5WID1OAIljL HtLH vMtIMDAH51AH >HtHDH5j11Lt$pL-cJH5D17LdHtA@ALDH|$ <6yHl$H|$CH;HD$dH3%(H([]A\A]A^A_LIHHLl$MfLL H|$|$D/H|$cu_1H52 yIHuHl$H|$HzHD$dH3%(H(L[]A\A]A^A_`H=!H=tEH HH HHEHz;IH81UH#HT;LHH81#EDL$MH H { HEH;H H81@H:H=H HfDAWL=C6AVIAUIATAUH-46SL)HHt1LLDAHH9uH[]A\A]A^A_ff.HH,%s set =%s%u%s%s Capabilities not availableunable to select CAP_SETPCAPclearraiseallfailed to allocate names failed to %s ambient [%s=%u] unlockedyesno???/bin/bash--drop=failed to drop [%s=%u] --dropped=--has-ambientambient set not supported --addamb=--delamb=--noambfailed to reset ambient set --inh=Out of memory for inh setnone%s %s+i--caps=unable to interpret [%s] --modesSupported modes:UNKNOWN %s--mode=failed to set mode [%s]: %s --inmode=--keep=--chroot=/--secbits=--forkfor=already forked unable to fork()--killit=no forked process to kill Unable to kill child process--uid=Failed to set uid=%u: %s --cap-uid=Failed to cap_setuid(%u): %s --gid=Failed to set gid=%u: %s --groups=No memory for [%s] operation No memory for gid list Failed to setgroups. --user=User [%s] not known --decode=0x%016llx=--supports=--printCurrent: %s BoundingAmbient secure-noroot: %s (%s) secure-keep-caps: %s (%s) uid=%u(%s) euid=%u(%s) gid=%u(%s) %s%u(%s)Guessed mode: %s (%d) --==execve /bin/bash failed! --has-p=cap[%s] not permitted --has-i=cap[%s] not inheritable --has-a=--is-uid=uid: got=%d, want=%d --is-gid=gid: got=%d, want=%d --helpunsupported mode: %s modification requires CAP_SETPCAP unable to raise CAP_SETPCAP for AMBIENT changesunable to lower CAP_SETPCAP post AMBIENT changeUnable to %s ambient capability [%s] capability [%s] is unknown to libcap WARNING: libcap needs an update (cap=%d should have a name). unable to raise CAP_SETPCAP for BSET changesunable to lower CAP_SETPCAP post BSET changeUnable to drop bounding capability [%s] cap[%s] not recognized by library cap[%s] raised in bounding vector libcap:cap_clear_flag() internal errorFatal error concerning process capabilitiesFatal error internalizing capabilitiesUnable to set inheritable capabilitiesUnable to set capabilities [%s] mismatched mode got=%s want=%s prctl(PR_SET_KEEPCAPS, %u) failed: %s Unable to duplicate capabilitiesunable to select CAP_SET_SYS_CHROOTunable to raise CAP_SYS_CHROOTunable to lower CAP_SYS_CHROOTUnable to chroot/chdir to [%s]failed to set securebits to 0%o/0x%x waitpid didn't match child: %u != %u child terminated with odd signal (%d != %d) Too many groups specified (%d) Failed to identify gid for group [%s] Unable to get group list for userUnable to set group list for userFailed to set uid=%u(user=%s): %s cap[%s=%d] not supported by kernel Securebits: 0%lo/0x%lx/%u'b%s secure-no-suid-fixup: %s (%s) secure-no-ambient-raise: %s (%s) cap[%s] not in ambient vector usage: %s [args ...] --help this message (or try 'man capsh') --print display capability relevant state --decode=xxx decode a hex string to a list of caps --supports=xxx exit 1 if capability xxx unsupported --has-p=xxx exit 1 if capability xxx not permitted --has-i=xxx exit 1 if capability xxx not inheritable --drop=xxx remove xxx,.. capabilities from bset --dropped=xxx exit 1 unless bounding cap xxx dropped --has-ambient exit 1 unless ambient vector supported --has-a=xxx exit 1 if capability xxx not ambient --addamb=xxx add xxx,... capabilities to ambient set --delamb=xxx remove xxx,... capabilities from ambient --noamb reset (drop) all ambient capabilities --caps=xxx set caps as per cap_from_text() --inh=xxx set xxx,.. inheritiable set --secbits= write a new value for securebits --keep= set keep-capabability bit to --uid= set uid to (hint: id ) --cap-uid= libcap cap_setuid() to change uid --is-uid= exit 1 if uid != --gid= set gid to (hint: id ) --is-gid= exit 1 if gid != --groups=g,... set the supplemental groups --user= set uid,gid and groups to that of user --chroot=path chroot(2) to this path --modes list libcap named capability modes --mode= set capability mode to --inmode= exit 1 if current mode is not --killit= send signal(n) to child --forkfor= fork and make child sleep for sec == re-exec(capsh) with args as for -- -- remaining arguments are for /bin/bash (without -- [%s] will simply exit(0)) ;X ľ$tt0$\T<zRx (/D$40 FJ w?:*3$"\(0t@HBLP K(A0{ (H BBBM A(F BBB(<ADG B AAA `BBB E(D0A8D` 8A0A(B BBBI  8D0A(B BBBE 0h\{FBB B(A0A8GDeFIE E(D0H8G@n8A0A(B BBB@@ E{{o  Y } ooooo{0 @ P ` p !! !0!@!P!`!p!!!!!!!!!"" "0"@"P"`"p"""""""""## #0#@#P#`#p#########$$ $0$/usr/lib/debug/.dwz/x86_64-linux-gnu/libcap2-bin.debugsbӱ@ |Z6ff026fe08ec2bd524482d8c1b99207d8bca54.debug &.shstrtab.interp.note.gnu.property.note.gnu.build-id.note.ABI-tag.gnu.hash.dynsym.dynstr.gnu.version.gnu.version_r.rela.dyn.rela.plt.init.plt.got.plt.sec.text.fini.rodata.eh_frame_hdr.eh_frame.init_array.fini_array.dynamic.data.bss.gnu_debugaltlink.gnu_debuglink 88 &XX$9|| Go0Q Y Yaono`}B  @$@$0p$p$((5EE PP\\a\a\aa{k{k{k}m`p ph pK\p4p"